IOC Report
MzXmoBVXtU.exe

loading gif

Files

File Path
Type
Category
Malicious
MzXmoBVXtU.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MzXmoBVXtU.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpA71E.tmp
ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\XenoManager\MzXmoBVXtU.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\XenoManager\MzXmoBVXtU.exe:Zone.Identifier
ASCII text, with CRLF line terminators
modified
malicious

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\MzXmoBVXtU.exe
"C:\Users\user\Desktop\MzXmoBVXtU.exe"
malicious
C:\Users\user\Desktop\MzXmoBVXtU.exe
C:\Users\user\Desktop\MzXmoBVXtU.exe
malicious
C:\Users\user\Desktop\MzXmoBVXtU.exe
C:\Users\user\Desktop\MzXmoBVXtU.exe
malicious
C:\Users\user\Desktop\MzXmoBVXtU.exe
C:\Users\user\Desktop\MzXmoBVXtU.exe
malicious
C:\Users\user\AppData\Roaming\XenoManager\MzXmoBVXtU.exe
"C:\Users\user\AppData\Roaming\XenoManager\MzXmoBVXtU.exe"
malicious
C:\Users\user\AppData\Roaming\XenoManager\MzXmoBVXtU.exe
C:\Users\user\AppData\Roaming\XenoManager\MzXmoBVXtU.exe
malicious
C:\Users\user\AppData\Roaming\XenoManager\MzXmoBVXtU.exe
C:\Users\user\AppData\Roaming\XenoManager\MzXmoBVXtU.exe
malicious
C:\Users\user\AppData\Roaming\XenoManager\MzXmoBVXtU.exe
C:\Users\user\AppData\Roaming\XenoManager\MzXmoBVXtU.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"schtasks.exe" /Create /TN "cms" /XML "C:\Users\user\AppData\Local\Temp\tmpA71E.tmp" /F
malicious
C:\Users\user\Desktop\MzXmoBVXtU.exe
C:\Users\user\Desktop\MzXmoBVXtU.exe
malicious
C:\Users\user\Desktop\MzXmoBVXtU.exe
C:\Users\user\Desktop\MzXmoBVXtU.exe
malicious
C:\Users\user\Desktop\MzXmoBVXtU.exe
C:\Users\user\Desktop\MzXmoBVXtU.exe
malicious
C:\Users\user\Desktop\MzXmoBVXtU.exe
C:\Users\user\Desktop\MzXmoBVXtU.exe
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 4 hidden processes, click here to show them.

URLs

Name
IP
Malicious
91.92.248.167
malicious

IPs

IP
Domain
Country
Malicious
91.92.248.167
unknown
Bulgaria
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2E31000
trusted library allocation
page read and write
malicious
3052000
trusted library allocation
page read and write
malicious
402000
remote allocation
page execute and read and write
malicious
3298000
trusted library allocation
page read and write
malicious
3345000
trusted library allocation
page read and write
malicious
3061000
trusted library allocation
page read and write
malicious
3111000
trusted library allocation
page read and write
malicious
2F2F000
trusted library allocation
page read and write
malicious
2D11000
trusted library allocation
page read and write
malicious
2F20000
trusted library allocation
page read and write
malicious
195F000
stack
page read and write
4E80000
heap
page execute and read and write
2E20000
heap
page read and write
1264000
trusted library allocation
page read and write
701D000
stack
page read and write
2DF0000
heap
page execute and read and write
1060000
trusted library allocation
page read and write
595E000
stack
page read and write
14D3000
heap
page read and write
1430000
heap
page read and write
7E0000
heap
page read and write
EF8000
stack
page read and write
1060000
trusted library allocation
page read and write
AB0000
heap
page read and write
E28E000
stack
page read and write
101F000
stack
page read and write
12A7000
trusted library allocation
page execute and read and write
151E000
stack
page read and write
C4D000
trusted library allocation
page execute and read and write
510D000
stack
page read and write
F22000
trusted library allocation
page read and write
586E000
stack
page read and write
10B1000
heap
page read and write
ADE000
heap
page read and write
100E000
stack
page read and write
12C0000
heap
page read and write
D90000
heap
page read and write
103E000
stack
page read and write
2D80000
heap
page execute and read and write
11D5000
heap
page read and write
3331000
trusted library allocation
page read and write
C17000
trusted library allocation
page execute and read and write
10C6000
heap
page read and write
BD0000
trusted library allocation
page read and write
1490000
trusted library section
page read and write
14D8000
heap
page read and write
1030000
heap
page read and write
1710000
trusted library allocation
page execute and read and write
1285000
heap
page read and write
AEA000
heap
page read and write
BE4000
trusted library allocation
page read and write
186B000
trusted library allocation
page execute and read and write
400000
remote allocation
page execute and read and write
11D0000
trusted library allocation
page execute and read and write
53BA000
stack
page read and write
174E000
stack
page read and write
4F3E000
stack
page read and write
465C000
trusted library allocation
page read and write
E56000
heap
page read and write
14C0000
trusted library allocation
page read and write
141E000
stack
page read and write
ABFE000
stack
page read and write
280F000
stack
page read and write
127F000
stack
page read and write
1369000
stack
page read and write
520E000
stack
page read and write
1020000
heap
page read and write
AE1F000
stack
page read and write
1274000
trusted library allocation
page read and write
BE3000
trusted library allocation
page execute and read and write
4FA0000
heap
page execute and read and write
3072000
trusted library allocation
page read and write
547D000
stack
page read and write
C60000
trusted library allocation
page read and write
5270000
trusted library allocation
page execute and read and write
1880000
heap
page read and write
1070000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
BB40000
trusted library allocation
page read and write
E040000
trusted library allocation
page read and write
547F000
stack
page read and write
2F00000
heap
page execute and read and write
1090000
heap
page read and write
12D0000
heap
page read and write
2A45000
trusted library allocation
page read and write
590E000
stack
page read and write
13E0000
heap
page read and write
ACB000
stack
page read and write
1340000
trusted library allocation
page execute and read and write
AF7000
heap
page read and write
12FB000
heap
page read and write
145C000
stack
page read and write
A6E000
stack
page read and write
A9FE000
stack
page read and write
173E000
stack
page read and write
343E000
stack
page read and write
15E0000
heap
page read and write
B2C000
stack
page read and write
1303000
heap
page read and write
13A0000
heap
page read and write
58FE000
stack
page read and write
F00000
heap
page read and write
4FEE000
stack
page read and write
A52000
unkown
page readonly
55CE000
stack
page read and write
32A0000
trusted library allocation
page read and write
11BE000
stack
page read and write
13D0000
heap
page read and write
56CF000
stack
page read and write
52AE000
stack
page read and write
7AB000
heap
page read and write
54BE000
stack
page read and write
2DCE000
stack
page read and write
DF90000
trusted library section
page read and write
3210000
heap
page read and write
539E000
stack
page read and write
1635000
heap
page read and write
3057000
trusted library allocation
page execute and read and write
1312000
heap
page read and write
3080000
trusted library allocation
page execute and read and write
F20000
heap
page read and write
6FC000
stack
page read and write
F90000
trusted library allocation
page execute and read and write
11E0000
heap
page read and write
5290000
heap
page read and write
15DF000
stack
page read and write
1740000
heap
page read and write
1123000
heap
page read and write
3280000
heap
page read and write
16A0000
trusted library allocation
page read and write
15BF000
stack
page read and write
1607000
heap
page read and write
F36000
heap
page read and write
1495000
heap
page read and write
558F000
stack
page read and write
4EBE000
stack
page read and write
D37000
heap
page read and write
8F9000
stack
page read and write
4111000
trusted library allocation
page read and write
3070000
trusted library allocation
page read and write
12DE000
heap
page read and write
CF0000
trusted library allocation
page read and write
107D000
trusted library allocation
page execute and read and write
4B3E000
stack
page read and write
1089000
trusted library allocation
page read and write
B90000
heap
page read and write
DBE000
stack
page read and write
133B000
heap
page read and write
12D9000
heap
page read and write
C54000
trusted library allocation
page read and write
16B3000
trusted library allocation
page execute and read and write
BF0000
trusted library allocation
page read and write
5A5E000
stack
page read and write
561E000
stack
page read and write
E14E000
stack
page read and write
125E000
stack
page read and write
FE7000
trusted library allocation
page execute and read and write
FD6000
trusted library allocation
page execute and read and write
12EA000
heap
page read and write
3DA1000
trusted library allocation
page read and write
1375000
heap
page read and write
F00000
heap
page read and write
58C0000
heap
page execute and read and write
526E000
stack
page read and write
C50000
trusted library allocation
page read and write
56DE000
stack
page read and write
1990000
heap
page read and write
E6EE000
stack
page read and write
719E000
stack
page read and write
4D8E000
stack
page read and write
D95000
heap
page read and write
B60000
heap
page read and write
F2B000
trusted library allocation
page execute and read and write
3D73000
trusted library allocation
page read and write
580E000
stack
page read and write
145F000
stack
page read and write
2FB0000
heap
page read and write
327C000
stack
page read and write
740000
heap
page read and write
1080000
trusted library allocation
page read and write
CF3000
trusted library allocation
page execute and read and write
F29000
heap
page read and write
3354000
trusted library allocation
page read and write
5770000
heap
page execute and read and write
1214000
heap
page read and write
1840000
heap
page read and write
142E000
stack
page read and write
1094000
trusted library allocation
page read and write
C8C000
stack
page read and write
1296000
trusted library allocation
page execute and read and write
129B000
trusted library allocation
page execute and read and write
310E000
stack
page read and write
147E000
stack
page read and write
FDA000
trusted library allocation
page execute and read and write
1290000
trusted library allocation
page read and write
53FE000
stack
page read and write
1873000
trusted library allocation
page execute and read and write
1190000
heap
page read and write
31E0000
trusted library allocation
page read and write
F60000
heap
page read and write
1980000
trusted library allocation
page read and write
FBD000
trusted library allocation
page execute and read and write
B00000
heap
page read and write
DA0000
heap
page read and write
F17000
trusted library allocation
page execute and read and write
1207000
heap
page read and write
2A41000
trusted library allocation
page read and write
160E000
stack
page read and write
14B4000
trusted library allocation
page read and write
14D9000
heap
page read and write
FB0000
trusted library allocation
page read and write
2FE6000
trusted library allocation
page read and write
1196000
trusted library allocation
page execute and read and write
CB0000
heap
page read and write
50FE000
stack
page read and write
F27000
trusted library allocation
page execute and read and write
E3E000
heap
page read and write
7A0000
heap
page read and write
C70000
heap
page read and write
F23000
heap
page read and write
10F0000
heap
page read and write
15CF000
stack
page read and write
106D000
trusted library allocation
page execute and read and write
170F000
stack
page read and write
133C000
stack
page read and write
49EE000
trusted library allocation
page read and write
7C1E000
stack
page read and write
1860000
trusted library allocation
page read and write
2BE0000
trusted library allocation
page read and write
129A000
trusted library allocation
page execute and read and write
12C0000
trusted library allocation
page read and write
525E000
stack
page read and write
1860000
trusted library allocation
page read and write
547E000
stack
page read and write
128E000
heap
page read and write
F10000
heap
page read and write
58AE000
stack
page read and write
59CE000
stack
page read and write
185F000
stack
page read and write
F08000
heap
page read and write
1040000
trusted library allocation
page read and write
580E000
stack
page read and write
10E0000
trusted library allocation
page read and write
12FE000
stack
page read and write
1260000
trusted library allocation
page read and write
4F7E000
stack
page read and write
3090000
heap
page execute and read and write
BE60000
trusted library allocation
page read and write
2F9E000
stack
page read and write
1251000
heap
page read and write
14CE000
stack
page read and write
A70000
heap
page read and write
C0D000
stack
page read and write
4F2E000
stack
page read and write
9E5000
heap
page read and write
16E7000
trusted library allocation
page execute and read and write
C40000
trusted library allocation
page execute and read and write
9A0E000
stack
page read and write
571C000
stack
page read and write
95F000
stack
page read and write
1073000
trusted library allocation
page execute and read and write
1623000
heap
page read and write
B20000
heap
page read and write
BF4000
trusted library allocation
page read and write
2D90000
heap
page read and write
286E000
stack
page read and write
B70000
heap
page read and write
B01E000
stack
page read and write
123C000
stack
page read and write
E060000
trusted library allocation
page execute and read and write
1140000
trusted library allocation
page read and write
52EE000
stack
page read and write
E00000
heap
page execute and read and write
C70000
heap
page read and write
32B0000
heap
page execute and read and write
F6E000
stack
page read and write
CFD000
trusted library allocation
page execute and read and write
2850000
heap
page execute and read and write
1280000
trusted library allocation
page read and write
B050000
trusted library allocation
page execute and read and write
55DE000
stack
page read and write
2700000
heap
page read and write
1600000
heap
page read and write
C80000
heap
page read and write
AE7E000
stack
page read and write
1680000
heap
page read and write
2FD0000
trusted library allocation
page read and write
B5D000
heap
page read and write
4E80000
trusted library allocation
page read and write
F1E000
heap
page read and write
3E31000
trusted library allocation
page read and write
E20000
heap
page read and write
5910000
heap
page execute and read and write
5290000
heap
page read and write
D80000
heap
page read and write
EAE000
stack
page read and write
16C0000
trusted library allocation
page read and write
4953000
trusted library allocation
page read and write
C78000
heap
page read and write
16BD000
trusted library allocation
page execute and read and write
6F1E000
stack
page read and write
5280000
heap
page read and write
DE8000
stack
page read and write
BF0000
trusted library allocation
page read and write
1350000
heap
page read and write
AC8000
heap
page read and write
16B4000
trusted library allocation
page read and write
3221000
trusted library allocation
page read and write
1506000
heap
page read and write
11EE000
heap
page read and write
16CF000
stack
page read and write
AF1D000
stack
page read and write
4EEE000
stack
page read and write
58C0000
heap
page execute and read and write
12B1000
heap
page read and write
28AD000
stack
page read and write
2EF0000
trusted library allocation
page execute and read and write
3000000
heap
page read and write
2B01000
trusted library allocation
page read and write
F1A000
trusted library allocation
page execute and read and write
12AB000
trusted library allocation
page execute and read and write
C85000
heap
page read and write
C17000
trusted library allocation
page execute and read and write
D97000
trusted library allocation
page execute and read and write
1221000
heap
page read and write
184F000
stack
page read and write
14BF000
stack
page read and write
C44000
trusted library allocation
page read and write
2FE0000
trusted library allocation
page read and write
4B3E000
stack
page read and write
1880000
trusted library allocation
page read and write
2A41000
trusted library allocation
page read and write
1874000
trusted library allocation
page read and write
313E000
stack
page read and write
57FE000
stack
page read and write
2B80000
heap
page execute and read and write
78E000
unkown
page read and write
15C0000
heap
page read and write
787E000
stack
page read and write
2E00000
heap
page execute and read and write
1010000
trusted library allocation
page execute and read and write
DFE000
stack
page read and write
10A0000
heap
page read and write
11EA000
heap
page read and write
705E000
stack
page read and write
558E000
stack
page read and write
16E0000
trusted library allocation
page read and write
2D7E000
stack
page read and write
E6F000
stack
page read and write
14B7000
heap
page read and write
14BD000
trusted library allocation
page execute and read and write
E28000
heap
page read and write
1160000
heap
page read and write
FEB000
trusted library allocation
page execute and read and write
3BD000
stack
page read and write
CA6000
heap
page read and write
B90000
heap
page read and write
4FFE000
stack
page read and write
113C000
stack
page read and write
F00000
trusted library allocation
page read and write
14F9000
heap
page read and write
2D00000
heap
page read and write
1480000
heap
page read and write
C4E000
stack
page read and write
2C00000
heap
page read and write
FD0000
trusted library allocation
page read and write
1260000
trusted library allocation
page read and write
AC0000
heap
page read and write
119A000
trusted library allocation
page execute and read and write
91E000
stack
page read and write
3320000
heap
page read and write
BE0000
heap
page read and write
C30000
trusted library allocation
page read and write
557E000
stack
page read and write
1050000
trusted library allocation
page read and write
E43000
heap
page read and write
55DF000
stack
page read and write
5430000
trusted library allocation
page execute and read and write
49D7000
trusted library allocation
page read and write
E10000
trusted library allocation
page execute and read and write
799000
stack
page read and write
52F0000
heap
page read and write
10AB000
heap
page read and write
56E0000
heap
page read and write
558F000
stack
page read and write
53DE000
stack
page read and write
1867000
trusted library allocation
page execute and read and write
2B78000
trusted library allocation
page read and write
2B6E000
stack
page read and write
50EF000
stack
page read and write
D9F000
heap
page read and write
1530000
heap
page read and write
AE3000
heap
page read and write
2CFF000
stack
page read and write
323F000
stack
page read and write
4331000
trusted library allocation
page read and write
4D4E000
stack
page read and write
2DD0000
trusted library allocation
page read and write
EFC000
stack
page read and write
FB0000
trusted library allocation
page read and write
660000
heap
page read and write
52A0000
heap
page read and write
1520000
trusted library allocation
page read and write
1046000
trusted library allocation
page read and write
1380000
heap
page read and write
46BA000
trusted library allocation
page read and write
14DE000
stack
page read and write
1253000
trusted library allocation
page execute and read and write
13D5000
heap
page read and write
1129000
heap
page read and write
539E000
stack
page read and write
28BC000
stack
page read and write
E3CE000
stack
page read and write
11D0000
heap
page read and write
EBE000
stack
page read and write
F12000
trusted library allocation
page read and write
493C000
trusted library allocation
page read and write
1080000
heap
page read and write
2DA1000
trusted library allocation
page read and write
4EF0000
heap
page execute and read and write
FFC000
stack
page read and write
2E19000
trusted library allocation
page read and write
1030000
trusted library allocation
page read and write
12A0000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
E4CE000
stack
page read and write
BCE000
stack
page read and write
58FE000
stack
page read and write
26DD000
stack
page read and write
58AE000
stack
page read and write
E46E000
stack
page read and write
B80000
heap
page read and write
11A0000
trusted library allocation
page read and write
2D20000
trusted library allocation
page read and write
790000
heap
page read and write
1339000
stack
page read and write
3034000
trusted library allocation
page read and write
126C000
stack
page read and write
EEE000
stack
page read and write
58BF000
stack
page read and write
2EAE000
stack
page read and write
57BE000
stack
page read and write
C0E000
stack
page read and write
C43000
trusted library allocation
page execute and read and write
10C0000
heap
page read and write
AA0000
heap
page read and write
C1B000
trusted library allocation
page execute and read and write
12E3000
heap
page read and write
5869000
trusted library allocation
page read and write
A2E000
stack
page read and write
FA0000
trusted library allocation
page read and write
13C5000
heap
page read and write
125D000
trusted library allocation
page execute and read and write
2B70000
trusted library allocation
page read and write
AD7E000
stack
page read and write
527E000
stack
page read and write
1297000
trusted library allocation
page execute and read and write
E6AE000
stack
page read and write
1360000
heap
page read and write
D00000
heap
page read and write
121E000
stack
page read and write
4A32000
trusted library allocation
page read and write
729F000
stack
page read and write
1970000
trusted library allocation
page execute and read and write
58B0000
trusted library allocation
page read and write
549F000
stack
page read and write
50DE000
stack
page read and write
571E000
stack
page read and write
2900000
heap
page read and write
127D000
trusted library allocation
page execute and read and write
78BE000
stack
page read and write
52BD000
stack
page read and write
1287000
trusted library allocation
page execute and read and write
521E000
stack
page read and write
CEB000
stack
page read and write
2F2E000
stack
page read and write
1190000
trusted library allocation
page read and write
305B000
trusted library allocation
page execute and read and write
16C4000
trusted library allocation
page read and write
28C0000
heap
page read and write
C93000
heap
page read and write
187D000
trusted library allocation
page execute and read and write
1080000
heap
page read and write
7F9000
stack
page read and write
1050000
heap
page read and write
B3E000
stack
page read and write
715E000
stack
page read and write
1020000
heap
page execute and read and write
14DE000
stack
page read and write
1142000
heap
page read and write
183F000
stack
page read and write
3FA000
stack
page read and write
2B14000
trusted library allocation
page read and write
1273000
trusted library allocation
page execute and read and write
3D11000
trusted library allocation
page read and write
2AF0000
heap
page execute and read and write
4A5F000
trusted library allocation
page read and write
1010000
heap
page read and write
500C000
stack
page read and write
12F9000
stack
page read and write
14D0000
heap
page read and write
3290000
heap
page read and write
1146000
heap
page read and write
BED000
trusted library allocation
page execute and read and write
10F0000
heap
page read and write
E370000
trusted library allocation
page execute and read and write
2B86000
trusted library allocation
page read and write
FB3000
trusted library allocation
page execute and read and write
2DDE000
stack
page read and write
1629000
heap
page read and write
120E000
stack
page read and write
2D0F000
stack
page read and write
52AB000
heap
page read and write
511E000
stack
page read and write
B2D000
heap
page read and write
AAE000
stack
page read and write
5A90000
trusted library allocation
page read and write
51FF000
stack
page read and write
10B8000
heap
page read and write
A50000
unkown
page readonly
548E000
stack
page read and write
12B0000
trusted library allocation
page read and write
513E000
stack
page read and write
11AB000
trusted library allocation
page execute and read and write
2B82000
trusted library allocation
page read and write
13C0000
trusted library allocation
page read and write
100E000
stack
page read and write
BF4000
trusted library allocation
page read and write
13C0000
heap
page read and write
31F0000
trusted library allocation
page read and write
2DE0000
trusted library allocation
page read and write
12C8000
heap
page read and write
594E000
stack
page read and write
C30000
trusted library allocation
page read and write
14B0000
heap
page read and write
A00000
heap
page read and write
AD30000
trusted library allocation
page execute and read and write
B19E000
stack
page read and write
BDE000
stack
page read and write
1480000
heap
page read and write
3B01000
trusted library allocation
page read and write
57CF000
stack
page read and write
3F31000
trusted library allocation
page read and write
1720000
trusted library allocation
page read and write
1170000
heap
page read and write
1730000
trusted library allocation
page read and write
FC0000
heap
page read and write
1085000
heap
page read and write
4FFE000
stack
page read and write
1280000
trusted library allocation
page read and write
BA0000
heap
page read and write
CB0000
heap
page read and write
14F3000
heap
page read and write
9E0000
heap
page read and write
2A30000
heap
page execute and read and write
12B0000
trusted library allocation
page execute and read and write
1097000
heap
page read and write
2BCE000
stack
page read and write
585E000
stack
page read and write
1240000
trusted library allocation
page read and write
323E000
stack
page read and write
5A4E000
stack
page read and write
D08000
heap
page read and write
FA0000
trusted library allocation
page read and write
790E000
stack
page read and write
C1B000
trusted library allocation
page execute and read and write
12BD000
heap
page read and write
542E000
stack
page read and write
3470000
heap
page execute and read and write
D8F000
stack
page read and write
523D000
stack
page read and write
AB5000
heap
page read and write
E24E000
stack
page read and write
BC8000
stack
page read and write
2A3E000
stack
page read and write
5297000
heap
page read and write
3030000
trusted library allocation
page read and write
DB0000
heap
page read and write
59C000
stack
page read and write
12A0000
trusted library allocation
page read and write
1254000
trusted library allocation
page read and write
7DE000
stack
page read and write
12F6000
heap
page read and write
C50000
trusted library allocation
page read and write
499A000
trusted library allocation
page read and write
B90000
heap
page read and write
11A7000
trusted library allocation
page execute and read and write
128B000
trusted library allocation
page execute and read and write
1373000
heap
page read and write
120A000
heap
page read and write
8DF000
unkown
page read and write
14E6000
heap
page read and write
BE3000
trusted library allocation
page execute and read and write
2A47000
trusted library allocation
page read and write
54D0000
heap
page execute and read and write
50FC000
stack
page read and write
EF9000
stack
page read and write
31DE000
stack
page read and write
53FD000
stack
page read and write
CE0000
trusted library allocation
page read and write
D2A000
heap
page read and write
561C000
stack
page read and write
1370000
heap
page read and write
B80000
heap
page read and write
900000
heap
page read and write
AF9000
stack
page read and write
568F000
stack
page read and write
E7EE000
stack
page read and write
1063000
trusted library allocation
page execute and read and write
13DF000
stack
page read and write
1490000
heap
page read and write
2AAE000
stack
page read and write
B1B000
stack
page read and write
790000
heap
page read and write
2F31000
trusted library allocation
page read and write
72C000
stack
page read and write
570E000
stack
page read and write
1270000
trusted library allocation
page read and write
4481000
trusted library allocation
page read and write
AAFF000
stack
page read and write
C70000
heap
page read and write
E5AE000
stack
page read and write
C90000
heap
page read and write
1664000
heap
page read and write
11C0000
trusted library allocation
page read and write
DFE000
stack
page read and write
14B3000
trusted library allocation
page execute and read and write
1390000
heap
page read and write
1074000
trusted library allocation
page read and write
1700000
trusted library allocation
page read and write
CF4000
trusted library allocation
page read and write
4FDE000
stack
page read and write
54DE000
stack
page read and write
2E10000
trusted library allocation
page read and write
523E000
stack
page read and write
79BE000
stack
page read and write
E49000
heap
page read and write
BEE000
stack
page read and write
C51000
trusted library allocation
page read and write
535F000
stack
page read and write
4221000
trusted library allocation
page read and write
3861000
trusted library allocation
page read and write
69C000
stack
page read and write
1000000
trusted library allocation
page read and write
7D1E000
stack
page read and write
F8E000
stack
page read and write
2861000
trusted library allocation
page read and write
2E10000
heap
page execute and read and write
C40000
trusted library allocation
page execute and read and write
2FA0000
trusted library allocation
page read and write
59FE000
stack
page read and write
5860000
trusted library allocation
page read and write
E38E000
stack
page read and write
3A41000
trusted library allocation
page read and write
D1E000
heap
page read and write
10A5000
heap
page read and write
B09E000
stack
page read and write
BE4000
trusted library allocation
page read and write
2E20000
heap
page execute and read and write
3A41000
trusted library allocation
page read and write
10F9000
stack
page read and write
C60000
trusted library allocation
page read and write
4DEC000
stack
page read and write
1090000
trusted library allocation
page read and write
2DF0000
trusted library section
page read and write
1290000
trusted library allocation
page read and write
E56E000
stack
page read and write
327C000
stack
page read and write
4FBE000
stack
page read and write
4A04000
trusted library allocation
page read and write
32FE000
stack
page read and write
1130000
heap
page read and write
118E000
stack
page read and write
D9B000
trusted library allocation
page execute and read and write
1470000
trusted library allocation
page read and write
2EEC000
stack
page read and write
269E000
stack
page read and write
5480000
heap
page execute and read and write
52FC000
stack
page read and write
14C4000
trusted library allocation
page read and write
30DE000
stack
page read and write
49FE000
stack
page read and write
BD0000
trusted library allocation
page read and write
118F000
stack
page read and write
2F5E000
stack
page read and write
A60000
heap
page read and write
E30000
heap
page read and write
1460000
heap
page read and write
2A0F000
stack
page read and write
ACFF000
stack
page read and write
1750000
heap
page read and write
128E000
stack
page read and write
3481000
trusted library allocation
page read and write
FC0000
trusted library allocation
page read and write
1050000
heap
page read and write
18CE000
stack
page read and write
40E000
remote allocation
page execute and read and write
FB4000
trusted library allocation
page read and write
D1C000
stack
page read and write
28EE000
stack
page read and write
1064000
trusted library allocation
page read and write
2A6E000
stack
page read and write
B85000
heap
page read and write
16EB000
trusted library allocation
page execute and read and write
1460000
trusted library allocation
page read and write
2900000
heap
page read and write
There are 696 hidden memdumps, click here to show them.