IOC Report
Q7bAgeTZB8vmku7.exe

loading gif

Files

File Path
Type
Category
Malicious
Q7bAgeTZB8vmku7.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
initial sample
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Q7bAgeTZB8vmku7.exe.log
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Temp\tmpC03F.tmp
XML 1.0 document, ASCII text
dropped
malicious
C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe
PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
dropped
malicious
C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe:Zone.Identifier
ASCII text, with CRLF line terminators
dropped
malicious
C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\ODIlHgaFNJ.exe.log
ASCII text, with CRLF line terminators
dropped
C:\Users\user\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
data
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_10dmezfp.n1a.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_efzbhu0s.akm.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_hll5coqd.ufc.ps1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_kwiwdhbb.bdp.psm1
ASCII text, with no line terminators
dropped
C:\Users\user\AppData\Local\Temp\tmpD2AD.tmp
XML 1.0 document, ASCII text
dropped
There are 2 hidden files, click here to show them.

Processes

Path
Cmdline
Malicious
C:\Users\user\Desktop\Q7bAgeTZB8vmku7.exe
"C:\Users\user\Desktop\Q7bAgeTZB8vmku7.exe"
malicious
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe"
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ODIlHgaFNJ" /XML "C:\Users\user\AppData\Local\Temp\tmpC03F.tmp"
malicious
C:\Users\user\Desktop\Q7bAgeTZB8vmku7.exe
"C:\Users\user\Desktop\Q7bAgeTZB8vmku7.exe"
malicious
C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe
C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe
malicious
C:\Windows\SysWOW64\schtasks.exe
"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ODIlHgaFNJ" /XML "C:\Users\user\AppData\Local\Temp\tmpD2AD.tmp"
malicious
C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe
"C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe"
malicious
C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe
"C:\Users\user\AppData\Roaming\ODIlHgaFNJ.exe"
malicious
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
C:\Windows\System32\wbem\WmiPrvSE.exe
C:\Windows\system32\wbem\wmiprvse.exe -secured -Embedding
C:\Windows\System32\conhost.exe
C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
There are 2 hidden processes, click here to show them.

URLs

Name
IP
Malicious
http://x1.c.lo
unknown
http://pgsu.co.id
unknown
http://r10.o.lencr.org0#
unknown
https://account.dyn.com/
unknown
http://mail.pgsu.co.id
unknown
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
unknown
http://x1.c.lencr.org/0
unknown
http://x1.i.lencr.org/0
unknown
http://r10.i.lencr.org/0
unknown

Domains

Name
IP
Malicious
pgsu.co.id
107.178.108.41
malicious
mail.pgsu.co.id
unknown
malicious

IPs

IP
Domain
Country
Malicious
107.178.108.41
pgsu.co.id
United States
malicious

Memdumps

Base Address
Regiontype
Protect
Malicious
2E4E000
trusted library allocation
page read and write
malicious
4209000
trusted library allocation
page read and write
malicious
2E79000
trusted library allocation
page read and write
malicious
2E01000
trusted library allocation
page read and write
malicious
F48000
heap
page read and write
2320000
trusted library allocation
page read and write
30FE000
stack
page read and write
2AE2000
trusted library allocation
page read and write
7F7E000
stack
page read and write
49E0000
trusted library allocation
page read and write
5C0000
heap
page read and write
4A42000
trusted library allocation
page read and write
1730000
trusted library allocation
page read and write
7F6000
heap
page read and write
FD3000
heap
page read and write
65B0000
heap
page read and write
75A000
heap
page read and write
416000
remote allocation
page execute and read and write
937E000
stack
page read and write
90A000
stack
page read and write
F25000
trusted library allocation
page execute and read and write
4F7D000
trusted library allocation
page read and write
7FBE000
stack
page read and write
14DE000
stack
page read and write
77C0000
trusted library allocation
page read and write
F80000
heap
page read and write
3320000
heap
page read and write
1510000
heap
page read and write
625000
heap
page read and write
4C10000
trusted library allocation
page execute and read and write
A98E000
stack
page read and write
1027000
heap
page read and write
42D000
remote allocation
page execute and read and write
4C20000
heap
page execute and read and write
AA2000
trusted library allocation
page read and write
4F60000
trusted library allocation
page read and write
1737000
trusted library allocation
page execute and read and write
31CA000
heap
page read and write
77A0000
trusted library allocation
page execute and read and write
22FE000
stack
page read and write
4F62000
trusted library allocation
page read and write
790000
heap
page read and write
68C0000
trusted library allocation
page read and write
2330000
heap
page execute and read and write
55CF000
stack
page read and write
981E000
stack
page read and write
E32000
trusted library allocation
page read and write
1030000
heap
page read and write
57D2000
trusted library allocation
page read and write
4DA0000
trusted library allocation
page read and write
49FE000
trusted library allocation
page read and write
53DC000
stack
page read and write
61DF000
stack
page read and write
5EA0000
trusted library allocation
page read and write
101E000
heap
page read and write
2E30000
heap
page read and write
5790000
heap
page execute and read and write
15AA000
heap
page read and write
5B0000
heap
page read and write
CF9000
stack
page read and write
421000
remote allocation
page execute and read and write
102A000
heap
page read and write
4A80000
trusted library allocation
page read and write
170F000
stack
page read and write
49A0000
trusted library allocation
page read and write
3A19000
trusted library allocation
page read and write
2D5E000
trusted library allocation
page read and write
2D5B000
trusted library allocation
page read and write
9BE000
stack
page read and write
49D3000
heap
page read and write
4AB0000
heap
page read and write
60D0000
trusted library allocation
page read and write
57E0000
trusted library allocation
page execute and read and write
42C000
remote allocation
page execute and read and write
AB7000
trusted library allocation
page execute and read and write
436000
remote allocation
page execute and read and write
2AB4000
trusted library allocation
page read and write
3050000
trusted library allocation
page read and write
5CD0000
trusted library allocation
page read and write
4F6A000
trusted library allocation
page read and write
A88D000
stack
page read and write
13C0000
heap
page read and write
F00000
trusted library allocation
page read and write
39F1000
trusted library allocation
page read and write
5550000
heap
page read and write
FB0000
heap
page read and write
F1A000
trusted library allocation
page execute and read and write
1720000
trusted library allocation
page read and write
53A0000
heap
page read and write
7460000
heap
page read and write
995E000
stack
page read and write
E20000
trusted library allocation
page read and write
361A000
trusted library allocation
page read and write
ABB000
trusted library allocation
page execute and read and write
5257000
trusted library allocation
page read and write
5280000
heap
page execute and read and write
15B5000
heap
page read and write
FCA000
heap
page read and write
AD0000
trusted library allocation
page read and write
42B000
remote allocation
page execute and read and write
101C000
heap
page read and write
E90000
heap
page read and write
2D96000
trusted library allocation
page read and write
2D1C000
stack
page read and write
765E000
stack
page read and write
AA0000
trusted library allocation
page read and write
1037000
heap
page read and write
15A7000
heap
page read and write
ED0000
trusted library allocation
page read and write
400000
remote allocation
page execute and read and write
3512000
trusted library allocation
page read and write
E1D000
trusted library allocation
page execute and read and write
3201000
trusted library allocation
page read and write
151E000
heap
page read and write
E92000
unkown
page readonly
5746000
trusted library allocation
page read and write
623B000
trusted library allocation
page read and write
303D000
stack
page read and write
6950000
trusted library allocation
page read and write
420000
remote allocation
page execute and read and write
6140000
trusted library allocation
page read and write
2EBB000
heap
page read and write
572B000
trusted library allocation
page read and write
5720000
trusted library allocation
page read and write
2B9D000
stack
page read and write
AECC000
stack
page read and write
56E0000
trusted library allocation
page read and write
9A9E000
stack
page read and write
AE8E000
stack
page read and write
F76000
heap
page read and write
777000
heap
page read and write
E4F000
stack
page read and write
333F000
unkown
page read and write
3040000
trusted library allocation
page execute and read and write
E90000
unkown
page readonly
58D0000
trusted library section
page readonly
2E67000
trusted library allocation
page read and write
B17000
heap
page read and write
32FE000
unkown
page read and write
4F5B000
trusted library allocation
page read and write
57D0000
trusted library allocation
page read and write
4A6B000
trusted library allocation
page read and write
2D20000
trusted library allocation
page execute and read and write
AAA000
trusted library allocation
page execute and read and write
690E000
stack
page read and write
2AE0000
trusted library allocation
page read and write
2C30000
heap
page read and write
1504000
trusted library allocation
page read and write
813E000
stack
page read and write
F69000
heap
page read and write
7677000
heap
page read and write
4FCC000
stack
page read and write
3698000
trusted library allocation
page read and write
4F5D000
stack
page read and write
EE3000
trusted library allocation
page execute and read and write
4A06000
trusted library allocation
page read and write
2C2E000
stack
page read and write
5040000
heap
page read and write
A74E000
stack
page read and write
1500000
trusted library allocation
page read and write
465B000
stack
page read and write
4201000
trusted library allocation
page read and write
E26000
trusted library allocation
page execute and read and write
4F71000
trusted library allocation
page read and write
6970000
heap
page read and write
A4E000
stack
page read and write
65E2000
heap
page read and write
313F000
stack
page read and write
52DB000
stack
page read and write
402000
remote allocation
page execute and read and write
61DF000
stack
page read and write
4F76000
trusted library allocation
page read and write
CF8000
stack
page read and write
4BE0000
heap
page read and write
7F470000
trusted library allocation
page execute and read and write
1350000
heap
page read and write
4BCD000
stack
page read and write
B00000
trusted library allocation
page execute and read and write
49EB000
trusted library allocation
page read and write
10DE000
stack
page read and write
2314000
trusted library allocation
page read and write
56F0000
trusted library allocation
page read and write
65A0000
heap
page read and write
184E000
stack
page read and write
33EF000
stack
page read and write
411000
remote allocation
page execute and read and write
801000
heap
page read and write
619D000
stack
page read and write
4A50000
trusted library allocation
page execute and read and write
5724000
trusted library allocation
page read and write
1503000
trusted library allocation
page execute and read and write
9E20000
trusted library allocation
page read and write
573E000
trusted library allocation
page read and write
2D71000
trusted library allocation
page read and write
FC3000
heap
page read and write
A8D000
trusted library allocation
page execute and read and write
1897000
heap
page read and write
E50000
heap
page read and write
417000
remote allocation
page execute and read and write
9CDC000
stack
page read and write
5770000
trusted library allocation
page read and write
2345000
trusted library allocation
page read and write
2DF0000
heap
page execute and read and write
63A0000
trusted library allocation
page execute and read and write
E03000
trusted library allocation
page execute and read and write
DF0000
trusted library allocation
page read and write
F0D000
trusted library allocation
page execute and read and write
6C50000
heap
page read and write
A84E000
stack
page read and write
F5E000
heap
page read and write
3E29000
trusted library allocation
page read and write
117E000
stack
page read and write
172A000
trusted library allocation
page execute and read and write
7692000
heap
page read and write
428000
remote allocation
page execute and read and write
4F4E000
stack
page read and write
31FF000
stack
page read and write
1870000
heap
page read and write
73E000
stack
page read and write
FDB000
heap
page read and write
4BB0000
trusted library allocation
page execute and read and write
10F0000
trusted library allocation
page read and write
10E0000
trusted library allocation
page read and write
30E0000
heap
page read and write
7FC0000
trusted library section
page read and write
5D00000
heap
page read and write
455B000
stack
page read and write
4A60000
trusted library allocation
page read and write
5384000
heap
page read and write
2D90000
trusted library allocation
page read and write
247E000
stack
page read and write
F90000
trusted library allocation
page read and write
F70000
trusted library allocation
page execute and read and write
2E81000
trusted library allocation
page read and write
15AC000
heap
page read and write
1100000
heap
page read and write
5150000
heap
page read and write
1710000
trusted library allocation
page read and write
AC0E000
stack
page read and write
63EE000
stack
page read and write
30BF000
unkown
page read and write
58E0000
heap
page read and write
7F9000
heap
page read and write
970000
heap
page read and write
9C0000
heap
page read and write
7F270000
trusted library allocation
page execute and read and write
4AA0000
trusted library section
page readonly
E00000
heap
page read and write
5377000
trusted library allocation
page read and write
502E000
stack
page read and write
746E000
heap
page read and write
5250000
trusted library allocation
page read and write
40C000
remote allocation
page execute and read and write
6640000
heap
page read and write
3090000
trusted library allocation
page read and write
9B9E000
stack
page read and write
2310000
trusted library allocation
page read and write
94A000
stack
page read and write
1860000
trusted library allocation
page read and write
FDA000
stack
page read and write
5044000
heap
page read and write
1732000
trusted library allocation
page read and write
677E000
stack
page read and write
42A000
remote allocation
page execute and read and write
A90000
trusted library allocation
page read and write
2E90000
trusted library allocation
page read and write
2D6E000
trusted library allocation
page read and write
66DC000
stack
page read and write
681E000
stack
page read and write
61D000
stack
page read and write
31C0000
heap
page read and write
1130000
heap
page read and write
3270000
trusted library allocation
page read and write
E00000
trusted library allocation
page read and write
DD0000
heap
page read and write
AD8E000
stack
page read and write
5288000
trusted library allocation
page read and write
F60000
trusted library allocation
page read and write
39F9000
trusted library allocation
page read and write
403000
remote allocation
page execute and read and write
FD6000
heap
page read and write
5E9E000
stack
page read and write
2D76000
trusted library allocation
page read and write
4DB0000
heap
page read and write
AE0000
heap
page read and write
40B000
remote allocation
page execute and read and write
29F1000
trusted library allocation
page read and write
EED000
trusted library allocation
page execute and read and write
3A58000
trusted library allocation
page read and write
2E9E000
unkown
page read and write
171D000
trusted library allocation
page execute and read and write
F22000
trusted library allocation
page read and write
84A000
heap
page read and write
6B7D000
stack
page read and write
4F6E000
trusted library allocation
page read and write
1890000
heap
page read and write
29E0000
heap
page execute and read and write
54CC000
stack
page read and write
A80000
trusted library allocation
page read and write
529C000
trusted library allocation
page read and write
DD0000
heap
page read and write
A70000
trusted library allocation
page read and write
9B0000
heap
page read and write
5CC0000
trusted library allocation
page execute and read and write
2D40000
trusted library allocation
page read and write
150D000
trusted library allocation
page execute and read and write
173B000
trusted library allocation
page execute and read and write
24EE000
trusted library allocation
page read and write
4A40000
trusted library allocation
page read and write
5936000
trusted library allocation
page read and write
49D0000
heap
page read and write
1740000
heap
page read and write
2BDA000
stack
page read and write
FA8000
heap
page read and write
65DE000
stack
page read and write
30C0000
heap
page read and write
659E000
stack
page read and write
2E8C000
trusted library allocation
page read and write
5AD0000
heap
page read and write
5390000
heap
page read and write
30A0000
trusted library allocation
page read and write
4F80000
trusted library allocation
page execute and read and write
96E0000
heap
page read and write
655E000
stack
page read and write
33AE000
stack
page read and write
9BDB000
stack
page read and write
F40000
heap
page read and write
F12000
trusted library allocation
page read and write
4A0D000
trusted library allocation
page read and write
2C48000
trusted library allocation
page read and write
4ACC000
stack
page read and write
557000
stack
page read and write
991F000
stack
page read and write
429000
remote allocation
page execute and read and write
A84000
trusted library allocation
page read and write
4F50000
trusted library allocation
page read and write
94E000
stack
page read and write
3489000
trusted library allocation
page read and write
426000
remote allocation
page execute and read and write
2EA0000
heap
page read and write
3080000
trusted library allocation
page read and write
58F0000
heap
page read and write
2AAE000
trusted library allocation
page read and write
75E000
heap
page read and write
3095000
trusted library allocation
page read and write
2300000
trusted library allocation
page read and write
A83000
trusted library allocation
page execute and read and write
2D94000
trusted library allocation
page read and write
3340000
heap
page read and write
5540000
heap
page read and write
6230000
trusted library allocation
page read and write
3717000
trusted library allocation
page read and write
94BE000
stack
page read and write
354C000
trusted library allocation
page read and write
1110000
trusted library allocation
page read and write
F2B000
trusted library allocation
page execute and read and write
63DD000
stack
page read and write
687F000
stack
page read and write
6DAF000
stack
page read and write
6940000
heap
page read and write
6410000
heap
page read and write
66DE000
stack
page read and write
151A000
heap
page read and write
7760000
trusted library allocation
page read and write
9E1E000
stack
page read and write
36D3000
trusted library allocation
page read and write
6100000
trusted library allocation
page read and write
B10000
heap
page read and write
95B0000
heap
page read and write
EE4000
trusted library allocation
page read and write
2DA0000
trusted library allocation
page read and write
5A2C000
stack
page read and write
2E75000
trusted library allocation
page read and write
427000
remote allocation
page execute and read and write
F16000
trusted library allocation
page execute and read and write
56E7000
trusted library allocation
page read and write
49F8000
trusted library allocation
page read and write
52A0000
heap
page execute and read and write
5D24000
heap
page read and write
93BE000
stack
page read and write
1713000
trusted library allocation
page read and write
E55000
heap
page read and write
5930000
trusted library allocation
page read and write
5290000
trusted library allocation
page read and write
AFE1000
trusted library allocation
page read and write
3E67000
trusted library allocation
page read and write
E10000
trusted library allocation
page read and write
15D8000
heap
page read and write
574D000
trusted library allocation
page read and write
F74000
heap
page read and write
423000
remote allocation
page execute and read and write
49E4000
trusted library allocation
page read and write
514F000
stack
page read and write
3430000
heap
page read and write
A9D000
trusted library allocation
page execute and read and write
30B0000
heap
page execute and read and write
EF0000
heap
page read and write
5AB0000
heap
page read and write
5280000
trusted library allocation
page read and write
2ACD000
trusted library allocation
page read and write
7661000
heap
page read and write
359A000
trusted library allocation
page read and write
784000
heap
page read and write
56D0000
trusted library allocation
page read and write
9FE000
stack
page read and write
425000
remote allocation
page execute and read and write
E2A000
trusted library allocation
page execute and read and write
30FE000
stack
page read and write
AB2000
trusted library allocation
page read and write
4F5E000
trusted library allocation
page read and write
613D000
stack
page read and write
5380000
heap
page read and write
2ADB000
trusted library allocation
page read and write
60DB000
trusted library allocation
page read and write
60C0000
trusted library allocation
page execute and read and write
3481000
trusted library allocation
page read and write
2E50000
heap
page read and write
1553000
heap
page read and write
AA6000
trusted library allocation
page execute and read and write
412000
remote allocation
page execute and read and write
F10000
trusted library allocation
page read and write
13C5000
heap
page read and write
67DE000
stack
page read and write
57C0000
heap
page read and write
60B0000
trusted library allocation
page execute and read and write
2370000
heap
page read and write
325B000
trusted library allocation
page read and write
40D000
remote allocation
page execute and read and write
2340000
trusted library allocation
page read and write
5CF0000
heap
page read and write
56CC000
stack
page read and write
6960000
trusted library allocation
page execute and read and write
2D62000
trusted library allocation
page read and write
AFCC000
stack
page read and write
2D7D000
trusted library allocation
page read and write
E22000
trusted library allocation
page read and write
57F0000
trusted library allocation
page read and write
FBE000
heap
page read and write
12F7000
stack
page read and write
750000
heap
page read and write
5CE5000
heap
page read and write
1340000
heap
page read and write
E04000
trusted library allocation
page read and write
76F000
heap
page read and write
5C7E000
stack
page read and write
5208000
trusted library allocation
page read and write
56DA000
trusted library allocation
page read and write
4A30000
heap
page read and write
58B0000
trusted library allocation
page read and write
5CE0000
heap
page read and write
1722000
trusted library allocation
page read and write
620000
heap
page read and write
58F3000
heap
page read and write
E05000
heap
page read and write
691F000
stack
page read and write
1545000
heap
page read and write
83D000
heap
page read and write
4BA0000
heap
page read and write
5AC0000
trusted library allocation
page execute and read and write
2D50000
trusted library allocation
page read and write
2A66000
trusted library allocation
page read and write
422000
remote allocation
page execute and read and write
410000
remote allocation
page execute and read and write
2E4C000
trusted library allocation
page read and write
4488000
trusted library allocation
page read and write
4B9C000
stack
page read and write
10F4000
trusted library allocation
page read and write
29DE000
stack
page read and write
7FB000
heap
page read and write
4F82000
trusted library allocation
page read and write
2D30000
trusted library allocation
page read and write
45A000
stack
page read and write
437000
remote allocation
page execute and read and write
641E000
stack
page read and write
3060000
trusted library allocation
page read and write
AB0E000
stack
page read and write
3070000
heap
page read and write
1538000
heap
page read and write
4F70000
trusted library allocation
page read and write
2350000
trusted library allocation
page read and write
EE0000
trusted library allocation
page read and write
6220000
trusted library allocation
page execute and read and write
139E000
stack
page read and write
792000
heap
page read and write
4A01000
trusted library allocation
page read and write
F27000
trusted library allocation
page execute and read and write
4EFE000
stack
page read and write
4F54000
trusted library allocation
page read and write
EA0000
heap
page read and write
2AC8000
trusted library allocation
page read and write
61E0000
heap
page read and write
107E000
unkown
page read and write
3E01000
trusted library allocation
page read and write
2B2E000
stack
page read and write
E37000
trusted library allocation
page execute and read and write
1550000
heap
page read and write
FA0000
heap
page read and write
AD4F000
stack
page read and write
9A5E000
stack
page read and write
2EB0000
heap
page read and write
AC4E000
stack
page read and write
F48000
unkown
page readonly
651D000
stack
page read and write
2316000
trusted library allocation
page read and write
E3B000
trusted library allocation
page execute and read and write
5370000
trusted library allocation
page read and write
9D1E000
stack
page read and write
5CB0000
trusted library section
page read and write
1073000
heap
page read and write
4BE5000
heap
page read and write
E0D000
trusted library allocation
page execute and read and write
E35000
trusted library allocation
page execute and read and write
3796000
trusted library allocation
page read and write
5741000
trusted library allocation
page read and write
2481000
trusted library allocation
page read and write
24DB000
trusted library allocation
page read and write
60F0000
trusted library allocation
page execute and read and write
7B62000
trusted library allocation
page read and write
F5F000
stack
page read and write
1726000
trusted library allocation
page execute and read and write
307A000
stack
page read and write
370E000
trusted library allocation
page read and write
1041000
heap
page read and write
621D000
stack
page read and write
14F0000
trusted library allocation
page read and write
5D0000
heap
page read and write
102D000
heap
page read and write
53B0000
heap
page read and write
413000
remote allocation
page execute and read and write
651E000
stack
page read and write
780E000
stack
page read and write
527C000
stack
page read and write
96EC000
heap
page read and write
A93000
trusted library allocation
page read and write
There are 524 hidden memdumps, click here to show them.