IOC Report
7jmd8E2KEb.exe

loading gif

Files

File Path
Type
Category
Malicious
7jmd8E2KEb.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\7jmd8E2KEb.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmp7893.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\eFXWrQYLi.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\eFXWrQYLi.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\eFXWrQYLi.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_ej1tduf4.xv1.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_fsyx5cs0.0k5.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_lkxig1ci.yzj.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_qdfj0snb.g1u.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmp83DE.tmp
XML 1.0 document, ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\7jmd8E2KEb.exe
"C:\Users\user\Desktop\7jmd8E2KEb.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\eFXWrQYLi.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eFXWrQYLi" /XML "C:\Users\user\AppData\Local\Temp\tmp7893.tmp"
malicious
C:\Users\user\Desktop\7jmd8E2KEb.exe
"C:\Users\user\Desktop\7jmd8E2KEb.exe"
malicious
C:\Users\user\AppData\Roaming\eFXWrQYLi.exe
C:\Users\user\AppData\Roaming\eFXWrQYLi.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eFXWrQYLi" /XML "C:\Users\user\AppData\Local\Temp\tmp83DE.tmp"
malicious
C:\Users\user\AppData\Roaming\eFXWrQYLi.exe
"C:\Users\user\AppData\Roaming\eFXWrQYLi.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 3 hidden processes, click here to show them.

URLs

Name
IP
Malicious
204.10.161.140:27667
malicious
http://www.apache.org/licenses/LICENSE-2.0
unknown
http://www.fontbureau.com
unknown
http://www.fontbureau.com/designersG
unknown
https://api.ip.sb/ip
unknown
http://www.sakkal.com08
unknown
http://www.fontbureau.com/designers/?
unknown
http://www.founder.com.cn/cn/bThe
unknown
http://www.fontbureau.com/designers?
unknown
http://www.tiro.com
unknown
https://api.ip.s
unknown
http://www.fontbureau.com/designers
unknown
http://www.goodfont.co.kr
unknown
http://www.carterandcone.coml
unknown
http://www.sajatypeworks.com
unknown
http://www.typography.netD
unknown
http://www.fontbureau.com/designers/cabarga.htmlN
unknown
http://www.founder.com.cn/cn/cThe
unknown
http://www.galapagosdesign.com/staff/dennis.htm
unknown
http://www.founder.com.cn/cn
unknown
http://www.fontbureau.com/designers/frere-user.html
unknown
http://www.jiyu-kobo.co.jp/
unknown
https://discord.com/api/v9/users/
unknown
http://www.galapagosdesign.com/DPlease
unknown
http://www.fontbureau.com/designers8
unknown
http://www.fonts.com
unknown
http://www.sandoll.co.kr
unknown
http://www.urwpp.deDPlease
unknown
http://www.zhongyicts.com.cn
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://www.sakkal.com
unknown
There are 21 hidden URLs, click here to show them.

Domains

Name
IP
Malicious
171.39.242.20.in-addr.arpa
unknown

Memdumps

Base Address
Regiontype
Protect
Malicious
2F4F000
trusted library allocation
page read and write
5320000
trusted library section
page read and write
296D000
trusted library allocation
page read and write
2E01000
trusted library allocation
page read and write
517E000
heap
page read and write
2A83000
trusted library allocation
page read and write
950000
heap
page read and write
B23F000
stack
page read and write
D46000
trusted library allocation
page execute and read and write
2F42000
trusted library allocation
page read and write
5450000
heap
page read and write
748C000
heap
page read and write
56E0000
heap
page read and write
F56000
heap
page read and write
A70000
heap
page read and write
7140000
trusted library allocation
page read and write
F4E000
heap
page read and write
3150000
heap
page read and write
500000
heap
page read and write
2A20000
trusted library allocation
page read and write
290D000
trusted library allocation
page read and write
D93000
trusted library allocation
page execute and read and write
2AF5000
trusted library allocation
page read and write
52B4000
trusted library allocation
page read and write
718E000
stack
page read and write
2AF3000
trusted library allocation
page read and write
2F76000
trusted library allocation
page read and write
AD0000
trusted library allocation
page read and write
513D000
stack
page read and write
B22000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
2F59000
trusted library allocation
page read and write
2DC0000
heap
page execute and read and write
3440000
heap
page read and write
BB0D000
stack
page read and write
B2B000
trusted library allocation
page execute and read and write
2F72000
trusted library allocation
page read and write
5330000
trusted library allocation
page execute and read and write
526E000
trusted library allocation
page read and write
E25000
heap
page read and write
28EB000
trusted library allocation
page read and write
AA0000
heap
page read and write
4ACD000
stack
page read and write
A6A000
stack
page read and write
56D0000
heap
page read and write
3931000
trusted library allocation
page read and write
551E000
stack
page read and write
3871000
trusted library allocation
page read and write
4E80000
trusted library allocation
page execute and read and write
CE0000
heap
page read and write
5300000
trusted library allocation
page read and write
2FAA000
trusted library allocation
page read and write
5292000
trusted library allocation
page read and write
8B0000
heap
page read and write
4D50000
trusted library allocation
page read and write
AF6000
heap
page read and write
D80000
trusted library allocation
page execute and read and write
BEC000
heap
page read and write
2965000
trusted library allocation
page read and write
8ACE000
stack
page read and write
87EE000
stack
page read and write
AE5000
heap
page read and write
308D000
trusted library allocation
page read and write
5150000
heap
page read and write
315B000
heap
page read and write
EC7000
heap
page read and write
C00000
heap
page read and write
BE7000
heap
page read and write
E21000
heap
page read and write
2A40000
trusted library allocation
page read and write
2961000
trusted library allocation
page read and write
AFAF000
stack
page read and write
5140000
trusted library allocation
page read and write
FEE000
stack
page read and write
4D5B000
trusted library allocation
page read and write
2A75000
trusted library allocation
page read and write
2A50000
trusted library allocation
page read and write
3005000
trusted library allocation
page read and write
2860000
heap
page read and write
52B0000
trusted library allocation
page read and write
EA0000
heap
page read and write
86C3000
heap
page read and write
2C00000
trusted library allocation
page execute and read and write
49A000
stack
page read and write
52D0000
trusted library allocation
page read and write
E80000
trusted library allocation
page read and write
5380000
heap
page read and write
5385000
heap
page read and write
2F62000
trusted library allocation
page read and write
D42000
trusted library allocation
page read and write
5EA000
stack
page read and write
2F97000
trusted library allocation
page read and write
2C10000
heap
page read and write
2F3A000
trusted library allocation
page read and write
4E00000
trusted library allocation
page read and write
4ED0000
trusted library allocation
page execute and read and write
57D4000
trusted library allocation
page read and write
4D2B000
stack
page read and write
EBF000
stack
page read and write
B9AB000
stack
page read and write
BC0E000
stack
page read and write
EFE000
stack
page read and write
57D0000
trusted library allocation
page read and write
3E99000
trusted library allocation
page read and write
C07000
heap
page read and write
2B21000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
6CCF000
stack
page read and write
6CA000
stack
page read and write
5194000
heap
page read and write
B5C0000
heap
page read and write
D24000
trusted library allocation
page read and write
7F4A0000
trusted library allocation
page execute and read and write
2B1D000
trusted library allocation
page read and write
2A19000
trusted library allocation
page read and write
1407000
heap
page read and write
8BCE000
stack
page read and write
B6AE000
stack
page read and write
2BD0000
trusted library allocation
page read and write
2AED000
trusted library allocation
page read and write
2E8B000
trusted library allocation
page read and write
A50000
heap
page read and write
102E000
stack
page read and write
2ABE000
stack
page read and write
5B0000
heap
page read and write
2F9E000
stack
page read and write
C18000
heap
page read and write
E90000
trusted library allocation
page read and write
5281000
trusted library allocation
page read and write
D80000
trusted library allocation
page read and write
2A96000
trusted library allocation
page read and write
2B80000
trusted library allocation
page read and write
2FBD000
trusted library allocation
page read and write
5310000
trusted library allocation
page execute and read and write
E6E000
stack
page read and write
4E38000
trusted library allocation
page read and write
2AA8000
trusted library allocation
page read and write
B0EE000
stack
page read and write
8F7000
stack
page read and write
2F25000
trusted library allocation
page read and write
BD8D000
stack
page read and write
2B5E000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
2AE3000
trusted library allocation
page read and write
2FAE000
trusted library allocation
page read and write
BCF000
heap
page read and write
DAD000
trusted library allocation
page execute and read and write
2EB9000
trusted library allocation
page read and write
5445000
heap
page read and write
940000
heap
page read and write
BF5000
heap
page read and write
E37000
heap
page read and write
2A88000
trusted library allocation
page read and write
B96E000
stack
page read and write
2AB9000
trusted library allocation
page read and write
E59000
heap
page read and write
BC0000
heap
page read and write
1060000
heap
page read and write
B32000
heap
page read and write
BD4C000
stack
page read and write
E5E000
heap
page read and write
2A85000
trusted library allocation
page read and write
4E2F000
trusted library allocation
page read and write
C2F000
heap
page read and write
5FE000
stack
page read and write
2BD2000
trusted library allocation
page read and write
D2E000
stack
page read and write
B81F000
stack
page read and write
288F000
stack
page read and write
BDC000
heap
page read and write
DBE000
heap
page read and write
D3D000
trusted library allocation
page execute and read and write
6900000
trusted library allocation
page read and write
6D00000
heap
page read and write
2B0C000
trusted library allocation
page read and write
6E0E000
stack
page read and write
DA8000
heap
page read and write
5010000
trusted library section
page readonly
53A0000
heap
page read and write
DC2000
trusted library allocation
page read and write
2AB5000
trusted library allocation
page read and write
B33F000
stack
page read and write
DCB000
trusted library allocation
page execute and read and write
2BE0000
trusted library allocation
page execute and read and write
28FE000
trusted library allocation
page read and write
2F5B000
trusted library allocation
page read and write
1050000
trusted library allocation
page read and write
4DF0000
trusted library allocation
page execute and read and write
52A0000
trusted library allocation
page read and write
86AC000
heap
page read and write
AF3000
trusted library allocation
page execute and read and write
2FA6000
trusted library allocation
page read and write
2912000
trusted library allocation
page read and write
4E20000
trusted library allocation
page read and write
5150000
heap
page read and write
BBEE000
stack
page read and write
6EB0000
trusted library section
page read and write
2B06000
trusted library allocation
page read and write
57E0000
trusted library allocation
page execute and read and write
EAA000
heap
page read and write
E3F000
heap
page read and write
D5B000
trusted library allocation
page execute and read and write
2B27000
trusted library allocation
page read and write
D30000
trusted library allocation
page read and write
7482000
heap
page read and write
2B4B000
trusted library allocation
page read and write
A78000
heap
page read and write
99E000
stack
page read and write
4F60000
heap
page read and write
BC0000
heap
page read and write
DA0000
trusted library allocation
page read and write
2F57000
trusted library allocation
page read and write
39E8000
trusted library allocation
page read and write
B10000
trusted library allocation
page read and write
D90000
trusted library allocation
page read and write
3879000
trusted library allocation
page read and write
4E40000
trusted library allocation
page read and write
4E10000
trusted library allocation
page read and write
E15000
heap
page read and write
2F8B000
trusted library allocation
page read and write
5390000
heap
page read and write
400000
remote allocation
page execute and read and write
5310000
trusted library allocation
page execute and read and write
2B6A000
trusted library allocation
page read and write
527E000
trusted library allocation
page read and write
DE0000
trusted library allocation
page read and write
308B000
trusted library allocation
page read and write
52F0000
trusted library allocation
page read and write
4F63000
heap
page read and write
2A42000
trusted library allocation
page read and write
2F38000
trusted library allocation
page read and write
6CF0000
heap
page read and write
4878000
trusted library allocation
page read and write
2FAC000
trusted library allocation
page read and write
5430000
trusted library allocation
page read and write
2A81000
trusted library allocation
page read and write
9C0000
heap
page read and write
F5C000
heap
page read and write
4D6E000
trusted library allocation
page read and write
2FC5000
trusted library allocation
page read and write
3F20000
trusted library allocation
page read and write
45D000
stack
page read and write
5440000
heap
page read and write
2AAF000
trusted library allocation
page read and write
EB0000
heap
page read and write
2A7D000
trusted library allocation
page read and write
E20000
heap
page read and write
7112000
heap
page read and write
F57000
heap
page read and write
A40000
trusted library allocation
page read and write
2FBF000
trusted library allocation
page read and write
D33000
trusted library allocation
page read and write
71A0000
trusted library allocation
page read and write
2F93000
trusted library allocation
page read and write
4A0C000
stack
page read and write
476B000
trusted library allocation
page read and write
5155000
trusted library section
page readonly
1400000
heap
page read and write
2B65000
trusted library allocation
page read and write
6E40000
heap
page read and write
7450000
heap
page read and write
AFD000
trusted library allocation
page execute and read and write
4E30000
trusted library allocation
page read and write
2DD1000
trusted library allocation
page read and write
126F000
stack
page read and write
A10000
heap
page read and write
2A30000
trusted library allocation
page read and write
109E000
stack
page read and write
2840000
heap
page execute and read and write
4DD0000
heap
page read and write
4D76000
trusted library allocation
page read and write
52F0000
heap
page read and write
526B000
trusted library allocation
page read and write
2F28000
trusted library allocation
page read and write
52C0000
trusted library allocation
page execute and read and write
28E4000
trusted library allocation
page read and write
BAAC000
stack
page read and write
745C000
heap
page read and write
BE8F000
stack
page read and write
2A2D000
trusted library allocation
page execute and read and write
2FC7000
trusted library allocation
page read and write
2A2E000
trusted library allocation
page read and write
2B40000
trusted library allocation
page read and write
A0D000
stack
page read and write
FE0000
heap
page read and write
2E0D000
trusted library allocation
page read and write
4D54000
trusted library allocation
page read and write
590000
heap
page read and write
DB6000
trusted library allocation
page execute and read and write
C4E000
heap
page read and write
2E60000
trusted library allocation
page read and write
5159000
heap
page read and write
CA0000
heap
page read and write
2C88000
trusted library allocation
page read and write
116E000
stack
page read and write
2B6D000
trusted library allocation
page read and write
A6E000
stack
page read and write
56E0000
trusted library allocation
page read and write
5440000
heap
page read and write
D1E000
stack
page read and write
70D8000
heap
page read and write
B35000
heap
page read and write
5190000
heap
page read and write
52C5000
trusted library allocation
page read and write
2B0E000
trusted library allocation
page read and write
4E25000
heap
page read and write
E70000
trusted library allocation
page read and write
748A000
heap
page read and write
5163000
heap
page read and write
2F78000
trusted library allocation
page read and write
9C5000
heap
page read and write
2F23000
trusted library allocation
page read and write
B96000
heap
page read and write
2AF1000
trusted library allocation
page read and write
4F4B000
stack
page read and write
2AD6000
trusted library allocation
page read and write
4E35000
trusted library allocation
page read and write
D40000
trusted library allocation
page read and write
2FB3000
trusted library allocation
page read and write
4E16000
trusted library allocation
page read and write
2AEB000
trusted library allocation
page read and write
EAE000
stack
page read and write
EA0000
heap
page read and write
2F8F000
trusted library allocation
page read and write
528D000
trusted library allocation
page read and write
C5A000
stack
page read and write
AE5000
heap
page read and write
549B000
stack
page read and write
402000
remote allocation
page execute and read and write
E10000
heap
page read and write
3F6B000
trusted library allocation
page read and write
2AC2000
trusted library allocation
page read and write
ADEE000
stack
page read and write
B00000
trusted library allocation
page read and write
53B0000
heap
page read and write
4D71000
trusted library allocation
page read and write
2A7B000
trusted library allocation
page read and write
2F7A000
trusted library allocation
page read and write
514C000
stack
page read and write
DBA000
trusted library allocation
page execute and read and write
B86E000
stack
page read and write
3F4B000
trusted library allocation
page read and write
8652000
heap
page read and write
86AE000
heap
page read and write
5700000
trusted library allocation
page execute and read and write
EB0000
heap
page read and write
3DD1000
trusted library allocation
page read and write
B56E000
stack
page read and write
3935000
trusted library allocation
page read and write
3969000
trusted library allocation
page read and write
C40000
heap
page read and write
F30000
trusted library allocation
page read and write
88EE000
stack
page read and write
650000
heap
page read and write
4E20000
heap
page read and write
3DD5000
trusted library allocation
page read and write
2A90000
heap
page read and write
5260000
trusted library allocation
page read and write
52B0000
trusted library allocation
page read and write
5550000
heap
page read and write
C0D000
heap
page read and write
2F1B000
trusted library allocation
page read and write
2ECE000
trusted library allocation
page read and write
AF0000
trusted library allocation
page read and write
6F80000
trusted library allocation
page read and write
4D90000
heap
page read and write
462000
unkown
page readonly
E18000
heap
page read and write
2F55000
trusted library allocation
page read and write
2FB0000
trusted library allocation
page read and write
E0B000
heap
page read and write
F00000
trusted library allocation
page read and write
D52000
trusted library allocation
page read and write
EAE000
heap
page read and write
AF4000
trusted library allocation
page read and write
7F060000
trusted library allocation
page execute and read and write
63F000
stack
page read and write
2B23000
trusted library allocation
page read and write
E2F000
stack
page read and write
2AD4000
trusted library allocation
page read and write
E45000
heap
page read and write
5180000
heap
page read and write
B5AE000
stack
page read and write
2871000
trusted library allocation
page read and write
5573000
heap
page read and write
54DE000
stack
page read and write
4DE0000
trusted library allocation
page read and write
B71E000
stack
page read and write
2A5B000
trusted library allocation
page execute and read and write
54A0000
trusted library section
page readonly
5300000
heap
page read and write
51F0000
heap
page read and write
B7D000
heap
page read and write
E6E000
stack
page read and write
2F53000
trusted library allocation
page read and write
5410000
trusted library allocation
page execute and read and write
27FE000
stack
page read and write
5650000
trusted library allocation
page read and write
2AB1000
trusted library allocation
page read and write
4E14000
trusted library allocation
page read and write
2ABB000
trusted library allocation
page read and write
EE0000
heap
page read and write
2B0A000
trusted library allocation
page read and write
5330000
heap
page execute and read and write
2AA5000
trusted library allocation
page read and write
BD2E000
stack
page read and write
2C31000
trusted library allocation
page read and write
ED0000
heap
page read and write
5445000
heap
page read and write
FD0000
trusted library allocation
page read and write
A58000
heap
page read and write
2A70000
trusted library allocation
page read and write
FBE000
stack
page read and write
B47E000
stack
page read and write
DB2000
trusted library allocation
page read and write
2F74000
trusted library allocation
page read and write
6922000
trusted library allocation
page read and write
4DE2000
trusted library allocation
page read and write
2969000
trusted library allocation
page read and write
F50000
heap
page read and write
28C8000
trusted library allocation
page read and write
B67000
stack
page read and write
B22D000
stack
page read and write
500B000
stack
page read and write
5150000
trusted library section
page readonly
B50000
trusted library allocation
page execute and read and write
B1EE000
stack
page read and write
8640000
heap
page read and write
FC0000
heap
page read and write
C1E000
heap
page read and write
4EB0000
heap
page read and write
D94000
trusted library allocation
page read and write
5140000
heap
page read and write
2F4F000
unkown
page read and write
B08E000
stack
page read and write
B96E000
stack
page read and write
6F0E000
stack
page read and write
2FDF000
stack
page read and write
72FE000
stack
page read and write
4D93000
heap
page read and write
2A98000
trusted library allocation
page read and write
70DC000
heap
page read and write
2A24000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
300A000
trusted library allocation
page read and write
2DBD000
stack
page read and write
2F0E000
unkown
page read and write
2FA4000
trusted library allocation
page read and write
DB0000
heap
page read and write
B4BD000
stack
page read and write
5400000
trusted library allocation
page read and write
43AB000
trusted library allocation
page read and write
3C31000
trusted library allocation
page read and write
ED5000
heap
page read and write
B1A000
stack
page read and write
119E000
stack
page read and write
B08000
heap
page read and write
71A9000
trusted library allocation
page read and write
B12000
trusted library allocation
page read and write
F46000
heap
page read and write
29E3000
trusted library allocation
page read and write
8675000
heap
page read and write
4EF0000
trusted library allocation
page read and write
4EC0000
trusted library allocation
page read and write
2F40000
trusted library allocation
page read and write
5153000
heap
page read and write
2F8D000
trusted library allocation
page read and write
B86E000
stack
page read and write
54B0000
heap
page read and write
2FC1000
trusted library allocation
page read and write
29C0000
trusted library allocation
page read and write
DA4000
trusted library allocation
page read and write
2F21000
trusted library allocation
page read and write
2AB7000
trusted library allocation
page read and write
52D0000
trusted library allocation
page execute and read and write
DA0000
heap
page read and write
2C20000
heap
page execute and read and write
4F55000
trusted library section
page readonly
51A0000
heap
page execute and read and write
B37E000
stack
page read and write
2A9A000
trusted library allocation
page read and write
A90000
heap
page read and write
5310000
trusted library allocation
page read and write
E85000
trusted library allocation
page read and write
6D2C000
heap
page read and write
52C0000
heap
page read and write
B46D000
stack
page read and write
2BF0000
trusted library allocation
page read and write
5320000
trusted library allocation
page read and write
E16000
trusted library allocation
page read and write
52E0000
trusted library allocation
page read and write
2A7F000
trusted library allocation
page read and write
54C0000
heap
page read and write
AFC000
heap
page read and write
2920000
heap
page execute and read and write
2A57000
trusted library allocation
page execute and read and write
2BC0000
heap
page read and write
2E05000
trusted library allocation
page read and write
D23000
trusted library allocation
page execute and read and write
B27000
trusted library allocation
page execute and read and write
5110000
heap
page read and write
B009000
trusted library allocation
page read and write
2B04000
trusted library allocation
page read and write
42E000
remote allocation
page execute and read and write
2B10000
trusted library allocation
page read and write
DF0000
trusted library allocation
page execute and read and write
DC8000
heap
page read and write
2F45000
trusted library allocation
page read and write
7130000
trusted library allocation
page read and write
52C0000
trusted library allocation
page read and write
759E000
stack
page read and write
65A000
heap
page read and write
B1A000
trusted library allocation
page execute and read and write
B04E000
stack
page read and write
2AEF000
trusted library allocation
page read and write
2F1D000
trusted library allocation
page read and write
5330000
heap
page read and write
BAEE000
stack
page read and write
5030000
heap
page read and write
2BFC000
stack
page read and write
AE0000
heap
page read and write
2F5D000
trusted library allocation
page read and write
2FC3000
trusted library allocation
page read and write
D20000
trusted library allocation
page read and write
2BD0000
heap
page read and write
3D29000
trusted library allocation
page read and write
5460000
heap
page read and write
2A3E000
stack
page read and write
DA0000
trusted library allocation
page read and write
769E000
stack
page read and write
87AE000
stack
page read and write
5710000
trusted library allocation
page execute and read and write
B0AE000
stack
page read and write
B16000
trusted library allocation
page execute and read and write
A85000
heap
page read and write
B40000
trusted library allocation
page read and write
39A7000
trusted library allocation
page read and write
B0D000
trusted library allocation
page execute and read and write
A5E000
heap
page read and write
28CC000
stack
page read and write
8A8E000
stack
page read and write
E2E000
heap
page read and write
2B61000
trusted library allocation
page read and write
5160000
heap
page read and write
28D0000
trusted library allocation
page read and write
555E000
heap
page read and write
B60000
heap
page read and write
2E5C000
trusted library allocation
page read and write
2F83000
trusted library allocation
page read and write
CD7000
heap
page read and write
2A46000
trusted library allocation
page execute and read and write
3D68000
trusted library allocation
page read and write
3D09000
trusted library allocation
page read and write
B32D000
stack
page read and write
2906000
trusted library allocation
page read and write
2B66000
trusted library allocation
page read and write
52AD000
stack
page read and write
2A3D000
trusted library allocation
page execute and read and write
29EB000
trusted library allocation
page read and write
3B45000
trusted library allocation
page read and write
2B1F000
trusted library allocation
page read and write
7190000
trusted library allocation
page execute and read and write
BF7000
heap
page read and write
6AD0000
heap
page read and write
2AD2000
trusted library allocation
page read and write
B000000
trusted library allocation
page read and write
E14000
trusted library allocation
page read and write
5014000
trusted library section
page readonly
6ECE000
stack
page read and write
D4A000
trusted library allocation
page execute and read and write
B330000
heap
page read and write
70E4000
heap
page read and write
86A9000
heap
page read and write
2F1F000
trusted library allocation
page read and write
58F000
unkown
page read and write
54E000
unkown
page read and write
BC4C000
stack
page read and write
2E83000
trusted library allocation
page read and write
D6D000
stack
page read and write
283B000
stack
page read and write
B5BD000
stack
page read and write
BC2E000
stack
page read and write
D57000
stack
page read and write
D9D000
trusted library allocation
page execute and read and write
4F50000
trusted library section
page readonly
2F50000
heap
page read and write
A20000
heap
page read and write
54D0000
heap
page execute and read and write
89EE000
stack
page read and write
A92000
heap
page read and write
DD6000
heap
page read and write
543D000
stack
page read and write
CD0000
heap
page read and write
2AB3000
trusted library allocation
page read and write
5286000
trusted library allocation
page read and write
2AA0000
trusted library allocation
page read and write
2F15000
trusted library allocation
page read and write
898E000
stack
page read and write
F10000
heap
page execute and read and write
B810000
heap
page read and write
5160000
heap
page read and write
7440000
heap
page read and write
DA3000
trusted library allocation
page read and write
5130000
trusted library allocation
page read and write
D57000
trusted library allocation
page execute and read and write
E50000
heap
page read and write
7458000
heap
page read and write
DB0000
trusted library allocation
page read and write
52BF000
trusted library allocation
page read and write
E49000
heap
page read and write
FE7000
heap
page read and write
EE2000
heap
page read and write
5020000
heap
page read and write
2A52000
trusted library allocation
page read and write
2AD8000
trusted library allocation
page read and write
2BBE000
stack
page read and write
2AA2000
trusted library allocation
page read and write
2A23000
trusted library allocation
page execute and read and write
2901000
trusted library allocation
page read and write
4E70000
trusted library allocation
page read and write
D2D000
trusted library allocation
page execute and read and write
4D7D000
trusted library allocation
page read and write
BDF000
heap
page read and write
536E000
stack
page read and write
2AF7000
trusted library allocation
page read and write
3C39000
trusted library allocation
page read and write
DC7000
trusted library allocation
page execute and read and write
BE1000
heap
page read and write
5800000
trusted library allocation
page read and write
9BF0000
trusted library allocation
page execute and read and write
5264000
trusted library allocation
page read and write
2BC0000
heap
page read and write
C15000
heap
page read and write
2F95000
trusted library allocation
page read and write
7C7000
stack
page read and write
3DD1000
trusted library allocation
page read and write
2A7B000
stack
page read and write
D70000
trusted library allocation
page read and write
2AE9000
trusted library allocation
page read and write
28E0000
trusted library allocation
page read and write
460000
unkown
page readonly
2F91000
trusted library allocation
page read and write
56CD000
stack
page read and write
6E4E000
heap
page read and write
5340000
trusted library allocation
page execute and read and write
5350000
heap
page read and write
2ADA000
trusted library allocation
page read and write
2B13000
trusted library allocation
page read and write
ADD000
stack
page read and write
72B0000
trusted library allocation
page read and write
2B25000
trusted library allocation
page read and write
2850000
trusted library allocation
page read and write
6D23000
heap
page read and write
2A4A000
trusted library allocation
page execute and read and write
F80000
heap
page read and write
2F89000
trusted library allocation
page read and write
6DCE000
stack
page read and write
2F36000
trusted library allocation
page read and write
ADAE000
stack
page read and write
F25000
trusted library allocation
page read and write
F20000
trusted library allocation
page read and write
2931000
trusted library allocation
page read and write
There are 652 hidden memdumps, click here to show them.