IOC Report
UPDATED SSTATEMENT OF ACCOUNT.exe

loading gif

Files

File Path
Type
Category
Malicious
UPDATED SSTATEMENT OF ACCOUNT.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Temp\tmpC678.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\TgfQNrhQjjseHY.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\TgfQNrhQjjseHY.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\UPDATED SSTATEMENT OF ACCOUNT.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
modified
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_caww4iwt.cup.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_dnlgrcyq.nbj.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_iyunuva1.4cb.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_mra1hua4.ssk.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_p3nqfhd4.35i.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_q0tc3v3q.egd.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_xsh0e31k.x3w.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_zzva54p5.5aw.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD609.tmp
XML 1.0 document, ASCII text
dropped
C:\Users\user\AppData\Roaming\TgfQNrhQjjseHY.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
There are 6 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\UPDATED SSTATEMENT OF ACCOUNT.exe
"C:\Users\user\Desktop\UPDATED SSTATEMENT OF ACCOUNT.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\Desktop\UPDATED SSTATEMENT OF ACCOUNT.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\TgfQNrhQjjseHY.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TgfQNrhQjjseHY" /XML "C:\Users\user\AppData\Local\Temp\tmpC678.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Users\user\AppData\Roaming\TgfQNrhQjjseHY.exe
C:\Users\user\AppData\Roaming\TgfQNrhQjjseHY.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TgfQNrhQjjseHY" /XML "C:\Users\user\AppData\Local\Temp\tmpD609.tmp"
malicious
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://tempuri.org/x.xsd?MultiGames.Properties.Resources
unknown
http://mail.tabcoeng.com
unknown
https://account.dyn.com/
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
https://github.com/zuppao).
unknown
http://ip-api.com/line/?fields=hosting
208.95.112.1
http://ip-api.com
unknown

Domains

Name
IP
Malicious
mail.tabcoeng.com
135.181.124.14
malicious
bg.microsoft.map.fastly.net
199.232.214.172
ip-api.com
208.95.112.1
fp2e7a.wpc.phicdn.net
192.229.211.108

IPs

IP
Domain
Country
Malicious
135.181.124.14
mail.tabcoeng.com
Germany
malicious
208.95.112.1
ip-api.com
United States

Registry

Path
Value
Malicious
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
FileDirectory
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableAutoFileTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
EnableConsoleTracing
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
ConsoleTracingMask
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
MaxFileSize
HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
FileDirectory
There are 5 hidden registries, click here to show them.

Memdumps

Base Address
Regiontype
Protect
Malicious
402000
remote allocation
page execute and read and write
malicious
2F33000
trusted library allocation
page read and write
malicious
509F000
trusted library allocation
page read and write
malicious
2F5F000
trusted library allocation
page read and write
malicious
2A72000
trusted library allocation
page read and write
malicious
4510000
trusted library allocation
page read and write
malicious
2A9E000
trusted library allocation
page read and write
malicious
740000
heap
page read and write
5420000
heap
page read and write
131C000
heap
page read and write
2EA0000
trusted library allocation
page read and write
624E000
heap
page read and write
2B7E000
stack
page read and write
53F4000
trusted library allocation
page read and write
B4BE000
stack
page read and write
5910000
trusted library section
page read and write
CBFC000
stack
page read and write
CAFC000
stack
page read and write
17A5000
trusted library allocation
page read and write
8C1E000
stack
page read and write
8C60000
heap
page read and write
104E000
stack
page read and write
2F01000
trusted library allocation
page read and write
3689000
trusted library allocation
page read and write
575E000
stack
page read and write
544E000
stack
page read and write
556E000
trusted library allocation
page read and write
D10000
unkown
page readonly
6880000
heap
page read and write
1220000
trusted library allocation
page read and write
A3F000
stack
page read and write
4FC3000
heap
page read and write
555C000
stack
page read and write
C90000
trusted library allocation
page execute and read and write
24FB000
trusted library allocation
page read and write
509E000
stack
page read and write
C3D000
trusted library allocation
page execute and read and write
31D0000
trusted library allocation
page read and write
24F0000
trusted library allocation
page read and write
6240000
heap
page read and write
67C3000
trusted library allocation
page read and write
3AA7000
trusted library allocation
page read and write
53FE000
trusted library allocation
page read and write
1140000
heap
page read and write
247F000
trusted library allocation
page read and write
A44000
trusted library allocation
page read and write
4B10000
heap
page read and write
CBF000
heap
page read and write
1147000
heap
page read and write
3F7000
stack
page read and write
40E5000
trusted library allocation
page read and write
BA3E000
stack
page read and write
927000
heap
page read and write
B5BE000
stack
page read and write
5140000
heap
page execute and read and write
6BAE000
stack
page read and write
8A5E000
stack
page read and write
442E000
trusted library allocation
page read and write
4DF9000
trusted library allocation
page read and write
27D0000
heap
page read and write
53E6000
trusted library allocation
page read and write
1502000
trusted library allocation
page read and write
5B8E000
stack
page read and write
4DF0000
trusted library allocation
page read and write
C67000
trusted library allocation
page execute and read and write
51BE000
stack
page read and write
5930000
heap
page execute and read and write
1000000
heap
page read and write
1520000
trusted library allocation
page read and write
4B8A000
trusted library allocation
page read and write
4F4E000
stack
page read and write
D12000
unkown
page readonly
667E000
stack
page read and write
1210000
heap
page read and write
23EA000
trusted library allocation
page read and write
59EE000
stack
page read and write
8B4000
heap
page read and write
2B3F000
unkown
page read and write
61CB000
trusted library allocation
page read and write
130C000
heap
page read and write
881000
heap
page read and write
1120000
trusted library allocation
page read and write
5DAE000
stack
page read and write
B7FD000
stack
page read and write
53F0000
trusted library allocation
page read and write
EAA000
stack
page read and write
BF1F000
stack
page read and write
D34000
heap
page read and write
53E0000
trusted library allocation
page read and write
8F9000
stack
page read and write
504E000
stack
page read and write
57C0000
heap
page execute and read and write
883000
heap
page read and write
55BE000
stack
page read and write
14F0000
trusted library allocation
page read and write
243E000
stack
page read and write
5C20000
heap
page read and write
AD0000
heap
page read and write
A53000
trusted library allocation
page read and write
284C000
stack
page read and write
24EB000
stack
page read and write
2AA0000
heap
page read and write
5050000
heap
page read and write
295F000
stack
page read and write
3681000
trusted library allocation
page read and write
53E2000
trusted library allocation
page read and write
59CE000
stack
page read and write
4B50000
trusted library allocation
page read and write
31B0000
trusted library allocation
page read and write
AD5000
heap
page read and write
CD7000
heap
page read and write
2A9C000
trusted library allocation
page read and write
5EA000
stack
page read and write
3196000
trusted library allocation
page read and write
2490000
trusted library allocation
page read and write
FF940000
trusted library allocation
page execute and read and write
2A9A000
trusted library allocation
page read and write
58F0000
trusted library allocation
page read and write
3F01000
trusted library allocation
page read and write
F80000
heap
page read and write
4AE0000
trusted library allocation
page read and write
28EA000
trusted library allocation
page read and write
A43000
trusted library allocation
page execute and read and write
13F5000
heap
page read and write
23D0000
trusted library allocation
page execute and read and write
4E80000
heap
page read and write
18CA000
heap
page read and write
1300000
heap
page read and write
5554000
trusted library allocation
page read and write
6790000
heap
page read and write
8FE000
heap
page read and write
251D000
trusted library allocation
page read and write
5110000
trusted library allocation
page read and write
8A1E000
stack
page read and write
6244000
heap
page read and write
1200000
trusted library allocation
page read and write
CA0000
heap
page read and write
BE0000
heap
page read and write
147F000
stack
page read and write
57D0000
trusted library allocation
page read and write
FA7000
stack
page read and write
4F08000
trusted library allocation
page read and write
5120000
heap
page read and write
5D5E000
stack
page read and write
2D1F000
stack
page read and write
508C000
heap
page read and write
4AF0000
trusted library allocation
page execute and read and write
C50000
trusted library allocation
page read and write
677E000
stack
page read and write
2ABB000
heap
page read and write
18B0000
trusted library allocation
page read and write
530C000
stack
page read and write
800000
heap
page read and write
B6FD000
stack
page read and write
67B0000
trusted library allocation
page read and write
1393000
heap
page read and write
23F5000
trusted library allocation
page read and write
14D4000
trusted library allocation
page read and write
C56000
trusted library allocation
page execute and read and write
67D0000
trusted library allocation
page read and write
27CE000
unkown
page read and write
36C9000
trusted library allocation
page read and write
4B30000
trusted library allocation
page execute and read and write
185C000
stack
page read and write
4194000
trusted library allocation
page read and write
23E0000
trusted library allocation
page read and write
67A1000
trusted library allocation
page read and write
C5A000
trusted library allocation
page execute and read and write
279C000
stack
page read and write
4B3D000
stack
page read and write
67B0000
trusted library allocation
page read and write
2CFF000
unkown
page read and write
C62000
trusted library allocation
page read and write
5C28000
heap
page read and write
319D000
trusted library allocation
page read and write
51CB000
trusted library allocation
page read and write
4FBD000
stack
page read and write
150B000
trusted library allocation
page execute and read and write
6340000
heap
page read and write
14E3000
trusted library allocation
page read and write
2480000
trusted library allocation
page read and write
120B000
trusted library allocation
page execute and read and write
A5D000
trusted library allocation
page execute and read and write
2A90000
heap
page read and write
C40000
trusted library allocation
page read and write
B93E000
stack
page read and write
2EB4000
trusted library allocation
page read and write
347A000
trusted library allocation
page read and write
4243000
trusted library allocation
page read and write
67CD000
trusted library allocation
page read and write
7F540000
trusted library allocation
page execute and read and write
12AA000
heap
page read and write
1368000
heap
page read and write
2F5D000
trusted library allocation
page read and write
1288000
heap
page read and write
14F2000
trusted library allocation
page read and write
3211000
trusted library allocation
page read and write
2511000
trusted library allocation
page read and write
5408000
trusted library allocation
page read and write
2516000
trusted library allocation
page read and write
AA0000
trusted library allocation
page execute and read and write
23E5000
trusted library allocation
page read and write
26C1000
trusted library allocation
page read and write
3174000
trusted library allocation
page read and write
5570000
trusted library allocation
page read and write
D99000
stack
page read and write
5C75000
heap
page read and write
5071000
heap
page read and write
1207000
trusted library allocation
page execute and read and write
2D50000
heap
page read and write
1507000
trusted library allocation
page execute and read and write
EE8000
trusted library allocation
page read and write
177E000
stack
page read and write
3F05000
trusted library allocation
page read and write
6910000
trusted library allocation
page read and write
56B0000
trusted library allocation
page read and write
BD4000
trusted library allocation
page read and write
56A0000
trusted library allocation
page execute and read and write
B800000
heap
page read and write
7FE000
stack
page read and write
505B000
heap
page read and write
C20000
trusted library allocation
page read and write
14DD000
trusted library allocation
page execute and read and write
13F1000
heap
page read and write
5EED000
stack
page read and write
A72000
trusted library allocation
page read and write
14C0000
trusted library allocation
page read and write
58DF000
stack
page read and write
CCB000
heap
page read and write
31A2000
trusted library allocation
page read and write
2C5B000
heap
page read and write
2FA000
stack
page read and write
2C50000
heap
page read and write
2EF0000
heap
page read and write
2BB0000
trusted library allocation
page read and write
540D000
trusted library allocation
page read and write
2D4E000
stack
page read and write
2BA0000
heap
page read and write
CD5E000
stack
page read and write
950000
heap
page read and write
26DD000
stack
page read and write
84E000
heap
page read and write
27BA000
trusted library allocation
page read and write
6780000
trusted library allocation
page read and write
EDE000
stack
page read and write
C52000
trusted library allocation
page read and write
A62000
trusted library allocation
page read and write
11F0000
trusted library allocation
page read and write
4AD0000
heap
page read and write
5563000
trusted library allocation
page read and write
5C1E000
stack
page read and write
1346000
heap
page read and write
5D60000
trusted library section
page read and write
1270000
trusted library allocation
page read and write
4219000
trusted library allocation
page read and write
14E0000
trusted library allocation
page read and write
18C0000
heap
page read and write
1790000
trusted library allocation
page read and write
2A41000
trusted library allocation
page read and write
B310000
heap
page read and write
44D1000
trusted library allocation
page read and write
2767000
trusted library allocation
page read and write
11D3000
trusted library allocation
page execute and read and write
27AE000
trusted library allocation
page read and write
7C70000
trusted library allocation
page read and write
67A7000
trusted library allocation
page read and write
148E000
stack
page read and write
1202000
trusted library allocation
page read and write
3A41000
trusted library allocation
page read and write
42E8000
trusted library allocation
page read and write
8930000
trusted library section
page read and write
400000
remote allocation
page execute and read and write
1391000
heap
page read and write
4E91000
heap
page read and write
C34000
trusted library allocation
page read and write
27E4000
trusted library allocation
page read and write
BD0000
trusted library allocation
page read and write
7A31000
trusted library allocation
page read and write
B6BE000
stack
page read and write
17EE000
stack
page read and write
67B4000
trusted library allocation
page read and write
24F4000
trusted library allocation
page read and write
2485000
trusted library allocation
page read and write
27ED000
stack
page read and write
32F9000
trusted library allocation
page read and write
31F0000
trusted library allocation
page read and write
5A10000
heap
page read and write
317B000
trusted library allocation
page read and write
D7C000
heap
page read and write
2540000
trusted library allocation
page read and write
1880000
heap
page read and write
4AE2000
trusted library allocation
page read and write
BE0000
heap
page read and write
51C0000
trusted library allocation
page read and write
11BE000
stack
page read and write
5C70000
heap
page read and write
1343000
heap
page read and write
14FA000
trusted library allocation
page execute and read and write
129E000
heap
page read and write
58CF000
stack
page read and write
4F0E000
stack
page read and write
A66000
trusted library allocation
page execute and read and write
53E4000
trusted library allocation
page read and write
1066000
heap
page read and write
11D0000
trusted library allocation
page read and write
53F8000
trusted library allocation
page read and write
C2DE000
stack
page read and write
173E000
stack
page read and write
A90000
trusted library allocation
page read and write
27A0000
trusted library allocation
page read and write
438B000
trusted library allocation
page read and write
876000
heap
page read and write
FF250000
trusted library allocation
page execute and read and write
BD6000
trusted library allocation
page read and write
5B0E000
stack
page read and write
A4D000
trusted library allocation
page execute and read and write
14F6000
trusted library allocation
page execute and read and write
27BE000
trusted library allocation
page read and write
5C43000
heap
page read and write
6287000
heap
page read and write
5130000
trusted library allocation
page read and write
347E000
trusted library allocation
page read and write
24A0000
heap
page execute and read and write
A6A000
trusted library allocation
page execute and read and write
27C6000
trusted library allocation
page read and write
1352000
heap
page read and write
A77000
trusted library allocation
page execute and read and write
31BF000
trusted library allocation
page read and write
56D0000
trusted library allocation
page execute and read and write
C61E000
stack
page read and write
5C82000
heap
page read and write
C85E000
stack
page read and write
8C70000
trusted library allocation
page read and write
69AE000
stack
page read and write
5B1D000
stack
page read and write
3200000
heap
page read and write
2E5E000
stack
page read and write
2D00000
heap
page read and write
617D000
stack
page read and write
1870000
heap
page execute and read and write
6350000
trusted library allocation
page execute and read and write
11C0000
trusted library allocation
page read and write
A60000
trusted library allocation
page read and write
5401000
trusted library allocation
page read and write
1374000
heap
page read and write
2AAE000
trusted library allocation
page read and write
134E000
stack
page read and write
3191000
trusted library allocation
page read and write
CD4000
heap
page read and write
4279000
trusted library allocation
page read and write
4211000
trusted library allocation
page read and write
C9BE000
stack
page read and write
840000
heap
page read and write
23CE000
stack
page read and write
2780000
heap
page read and write
11DD000
trusted library allocation
page execute and read and write
23F0000
trusted library allocation
page read and write
31C0000
trusted library allocation
page read and write
602E000
stack
page read and write
31C5000
trusted library allocation
page read and write
2EB0000
trusted library allocation
page read and write
4E00000
heap
page read and write
1370000
heap
page read and write
571E000
stack
page read and write
C30000
trusted library allocation
page read and write
17A0000
trusted library allocation
page read and write
27CD000
trusted library allocation
page read and write
643D000
stack
page read and write
67E0000
trusted library allocation
page execute and read and write
6260000
heap
page read and write
6900000
trusted library allocation
page execute and read and write
3F68000
trusted library allocation
page read and write
1860000
trusted library allocation
page execute and read and write
D6D000
heap
page read and write
3170000
trusted library allocation
page read and write
2ED0000
trusted library allocation
page read and write
12F5000
heap
page read and write
524F000
stack
page read and write
770000
heap
page read and write
27D2000
trusted library allocation
page read and write
C65000
trusted library allocation
page execute and read and write
477B000
stack
page read and write
A40000
trusted library allocation
page read and write
2E9C000
stack
page read and write
2EB6000
trusted library allocation
page read and write
BDDC000
stack
page read and write
2850000
heap
page read and write
5412000
trusted library allocation
page read and write
2F65000
trusted library allocation
page read and write
BCDC000
stack
page read and write
318E000
trusted library allocation
page read and write
612E000
stack
page read and write
10A5000
heap
page read and write
2AA6000
trusted library allocation
page read and write
2470000
trusted library allocation
page read and write
BA7E000
stack
page read and write
2CBE000
unkown
page read and write
1250000
heap
page read and write
61C6000
trusted library allocation
page read and write
5415000
trusted library allocation
page read and write
5406000
trusted library allocation
page read and write
A50000
trusted library allocation
page read and write
27C1000
trusted library allocation
page read and write
BB7F000
stack
page read and write
12B6000
heap
page read and write
18A0000
trusted library allocation
page read and write
830000
trusted library allocation
page read and write
4FC0000
heap
page read and write
2A3A000
stack
page read and write
135E000
heap
page read and write
7BE000
stack
page read and write
682E000
stack
page read and write
5FEF000
stack
page read and write
BEA000
heap
page read and write
1530000
heap
page read and write
2AF0000
heap
page read and write
D48000
heap
page read and write
C6B000
trusted library allocation
page execute and read and write
6130000
trusted library allocation
page execute and read and write
1780000
trusted library allocation
page execute and read and write
3FFA000
trusted library allocation
page read and write
2EC0000
heap
page execute and read and write
C33000
trusted library allocation
page execute and read and write
11D4000
trusted library allocation
page read and write
4C75000
trusted library allocation
page read and write
11E0000
trusted library allocation
page read and write
28EE000
trusted library allocation
page read and write
623C000
stack
page read and write
1385000
heap
page read and write
1280000
heap
page read and write
267E000
stack
page read and write
7EF10000
trusted library allocation
page execute and read and write
1205000
trusted library allocation
page execute and read and write
53EB000
trusted library allocation
page read and write
5692000
trusted library allocation
page read and write
2BEE000
stack
page read and write
660000
heap
page read and write
1349000
heap
page read and write
43E000
remote allocation
page execute and read and write
2AB0000
heap
page read and write
56DC000
stack
page read and write
1350000
heap
page read and write
B2BE000
stack
page read and write
BC0000
trusted library allocation
page read and write
1260000
trusted library allocation
page execute and read and write
6BEE000
stack
page read and write
88F0000
trusted library allocation
page read and write
5A00000
trusted library section
page read and write
C9B000
stack
page read and write
6180000
trusted library allocation
page read and write
B2FE000
stack
page read and write
61B0000
trusted library allocation
page execute and read and write
C75E000
stack
page read and write
11F6000
trusted library allocation
page execute and read and write
E0E000
unkown
page readonly
2D5E000
stack
page read and write
27E0000
trusted library allocation
page read and write
5137000
trusted library allocation
page read and write
14ED000
trusted library allocation
page execute and read and write
2681000
trusted library allocation
page read and write
14D0000
trusted library allocation
page read and write
50CC000
stack
page read and write
AB0000
heap
page read and write
27AB000
trusted library allocation
page read and write
27F0000
trusted library allocation
page read and write
AB0000
heap
page read and write
62FF000
stack
page read and write
11FA000
trusted library allocation
page execute and read and write
5550000
trusted library allocation
page read and write
3F29000
trusted library allocation
page read and write
5900000
heap
page read and write
C4D000
trusted library allocation
page execute and read and write
2D9F000
stack
page read and write
CABF000
stack
page read and write
1060000
heap
page read and write
CC5E000
stack
page read and write
8C5D000
stack
page read and write
C4E0000
heap
page read and write
62C7000
heap
page read and write
10A0000
heap
page read and write
BF5E000
stack
page read and write
6C2F000
stack
page read and write
645F000
stack
page read and write
27B2000
trusted library allocation
page read and write
2570000
heap
page read and write
29FE000
stack
page read and write
655E000
stack
page read and write
29BE000
stack
page read and write
271A000
stack
page read and write
C05E000
stack
page read and write
BBE000
stack
page read and write
BE1D000
stack
page read and write
61C0000
trusted library allocation
page read and write
57CB000
stack
page read and write
1500000
trusted library allocation
page read and write
1230000
heap
page read and write
1419000
heap
page read and write
C4DD000
stack
page read and write
36E9000
trusted library allocation
page read and write
163E000
stack
page read and write
5ACE000
stack
page read and write
C80000
trusted library allocation
page read and write
11F2000
trusted library allocation
page read and write
57F3000
heap
page read and write
1050000
heap
page read and write
4DAB000
stack
page read and write
1130000
trusted library allocation
page read and write
A7B000
trusted library allocation
page execute and read and write
5B4D000
stack
page read and write
69EE000
stack
page read and write
4DB0000
heap
page execute and read and write
534E000
stack
page read and write
55D0000
heap
page read and write
62AC000
heap
page read and write
775000
heap
page read and write
C71E000
stack
page read and write
12B4000
heap
page read and write
12F0000
heap
page read and write
86B1000
trusted library allocation
page read and write
848000
heap
page read and write
579D000
stack
page read and write
179A000
trusted library allocation
page read and write
5690000
trusted library allocation
page read and write
4B00000
trusted library allocation
page read and write
2A30000
heap
page execute and read and write
C3DE000
stack
page read and write
14D3000
trusted library allocation
page execute and read and write
4C73000
heap
page read and write
3A69000
trusted library allocation
page read and write
CA8000
heap
page read and write
250E000
trusted library allocation
page read and write
316E000
stack
page read and write
5680000
heap
page read and write
3251000
trusted library allocation
page read and write
57F0000
heap
page read and write
4C70000
heap
page read and write
There are 526 hidden memdumps, click here to show them.